A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Cybersecurity Dictionary Breadcrumb Home Cybersecurity Dictionary Penetration Testing What is Penetration Testing? Penetration testing, sometimes called ethical hacking or shortened to pen test, is an authorized attack performed to evaluate a system or application in order to find exploitable vulnerabilities so they can be proactively remediated. There are many different types of pen tests, including: External, which determines the security posture of an internet-facing network Internal, which tests the controls of an organization's internal systems as if a hacker had bypassed the perimeter Application, which tests applications for vulnerabilities Wireless network testing, which evaluates whether popular wireless LAN infrastructure creates an opening for attackers to exploit Social engineering, which can include sending phishing emails (or impersonating other individuals on the phone or in person) to gain access to restricted areas or systems Physical testing, which evaluates the physical security of an organization, including door locks and badge/access controls Many of the tests above are often confined to a specific scope of systems or time period. Another concept in pen testing that's gaining momentum is red teaming. In war games, the red team represents the aggressor, whose job it is to test the capabilities of those on defense (the blue team). In pen testing, red team refers to testing in which there are no restrictions related to systems in scope or time windows. Hence, red team approaches provide the most accurate simulation of a real-world adversary. Image Related Services Physical Security Penetration Testing Threat Ingelligence Red & Purple Team Simulation Related TermsRed TeamBAS - Breach and Attack Simulation ToolsThreat Hunting Share: Contact Us
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?